VMware vCenter Multiple Vulnerabilities (VMSA-2015-0007)

critical Nessus Plugin ID 86255

Synopsis

The remote host has a virtualization management application installed that is affected by multiple vulnerabilities.

Description

The VMware vCenter Server installed on the remote host is affected by the following vulnerabilities :

- A flaw exists in the vpxd service due to improper sanitization of long heartbeat messages. An unauthenticated, remote attacker can exploit this to cause a denial of service. (CVE-2015-1047)

- A flaw exists due to an insecurely configured and remotely accessible JMX RMI service. An unauthenticated, remote attacker can exploit this, via an MLet file, to execute arbitrary code on the vCenter server with the same privileges as the web server. (CVE-2015-2342)

Solution

Upgrade to VMware vCenter Server 6.0.0b (6.0.0 build-2776510), 5.5u3 (5.5.0 build-3000241), 5.1u3b (5.1.0 build-3070521), or 5.0u3e (5.0.0 build-3073234) or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2015-0007.html

https://www.zerodayinitiative.com/advisories/ZDI-15-455/

Plugin Details

Severity: Critical

ID: 86255

File Name: vmware_vcenter_vmsa-2015-0007.nasl

Version: 1.13

Type: remote

Family: Misc.

Published: 10/2/2015

Updated: 9/24/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:vmware:vcenter_server

Required KB Items: Host/VMware/vCenter, Host/VMware/version, Host/VMware/release

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/1/2015

Vulnerability Publication Date: 10/1/2015

Exploitable With

Core Impact

Metasploit (Java JMX Server Insecure Configuration Java Code Execution)

Reference Information

CVE: CVE-2015-1047, CVE-2015-2342